نتایج جستجو برای: hack

تعداد نتایج: 658  

2007
Deepak Dhungana Paul Grünbacher Rick Rabiser

Despite its increasing popularity the widespread adoption of product line engineering is still hampered by a Hack of flexible and extensible approaches that can be tailored to deal with diverse organizational specifics such as architectural styles, languages, or modeling notations. Many existing product line approaches focus on process aspects and provide general-purpose modeling approaches. In...

Journal: :CoRR 2014
João Batista Florindo Núbia Rosa da Silva Liliane Maria Romualdo Fernanda de Fátima da Silva Pedro Henrique de Cerqueira Luz Valdo Rodrigues Herling Odemir Martinez Bruno

The use of a rapid and accurate method in diagnosis and classification of species and/or cultivars of forage has practical relevance, scientific and trade in various areas of study. Thus, leaf samples of fodder plant species Brachiaria were previously identified, collected and scanned to be treated by means of artificial vision to make the database and be used in subsequent classifications. For...

Journal: :Optics express 2011
Sebastien Sauge Lars Lydersen Andrey Anisimov Johannes Skaar Vadim Makarov

We control using bright light an actively-quenched avalanche single-photon detector. Actively-quenched detectors are commonly used for quantum key distribution (QKD) in the visible and near-infrared range. This study shows that these detectors are controllable by the same attack used to hack passively-quenched and gated detectors. This demonstrates the generality of our attack and its possible ...

2015
Saad Alsunbul Phu Dung Le Jefferson Tan

Network infrastructures have played important part in most daily communications for business industries, social networking, government sectors and etc. Despites the advantages that came from such functionalities, security threats have become a daily struggle. One major security threat is hacking. Consequently, security experts and researchers have suggested possible security solutions such as F...

2010
Dung Vu Pham Malka N. Halgamuge Ali Syed Priyan Mendis

Malware replicating via USB storage devices including worms, virus, Trojan horses and other malicious codes together with USB based hack tools such as Pod Slurp and USB Switchblade have accounted for many serious security issues for the last few years. The majority of these malicious codes exploit Windows Autoplay features to automatically launch attacks on host computers transparently to the u...

Journal: :Computer 2016
J Voas K Schaffer

We asked 7 experts 7 questions to find out what has occurred recently in terms of applying formal methods (FM) to security-centric, cyber problems. We are continually reminded of the 1996 paper by Tony Hoare "How did Software Get So Reliable Without Proof?" [1] In that vein, how did we get so insecure with proof? Given daily press announcements concerning new malware, data breaches, and privacy...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید